diff options
author | Eric Paris <eparis@redhat.com> | 2012-08-24 15:58:45 -0400 |
---|---|---|
committer | Eric Paris <eparis@redhat.com> | 2013-07-25 13:02:50 -0400 |
commit | 40d3d0b85fa22084fc3b7eeb943aca365097cea3 (patch) | |
tree | 16df1dd377ea7a846a2de3541b12a7934f48406a /security/selinux | |
parent | b138004ea0382bdc6d02599c39392651b4f63889 (diff) | |
download | op-kernel-dev-40d3d0b85fa22084fc3b7eeb943aca365097cea3.zip op-kernel-dev-40d3d0b85fa22084fc3b7eeb943aca365097cea3.tar.gz |
SELinux: remove crazy contortions around proc
We check if the fsname is proc and if so set the proc superblock security
struct flag. We then check if the flag is set and use the string 'proc'
for the fsname instead of just using the fsname. What's the point? It's
always proc... Get rid of the useless conditional.
Signed-off-by: Eric Paris <eparis@redhat.com>
Diffstat (limited to 'security/selinux')
-rw-r--r-- | security/selinux/hooks.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 911b780..42b538c 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -678,7 +678,7 @@ static int selinux_set_mnt_opts(struct super_block *sb, sbsec->flags |= SE_SBPROC; /* Determine the labeling behavior to use for this filesystem type. */ - rc = security_fs_use((sbsec->flags & SE_SBPROC) ? "proc" : sb->s_type->name, &sbsec->behavior, &sbsec->sid); + rc = security_fs_use(sb->s_type->name, &sbsec->behavior, &sbsec->sid); if (rc) { printk(KERN_WARNING "%s: security_fs_use(%s) returned %d\n", __func__, sb->s_type->name, rc); |